PS5 details: Is there a risk that hackers will exploit them?
inet infosec

PS5 details: Is there a risk that hackers will exploit them?

Sony's game developer and creator, Mark Cerny, gave some details about the new PS5 console. In one...
Read More

Cisco warns of vulnerabilities in 9000 series routers

Cisco has released 31 security tips this week, but has focused users on "critical" patches for ...
Read More

HP: Adds the Sure Sense malware blocker to its new devices

HP announced a series of updates and new features for PCs, as well as the official HP release ...
Read More

Covering vacancies in hacker security

Incidents of online attacks are increasing day by day. Previously no such attention was paid. After the incident with the ...
Read More

Oracle: New Critical Patch Update fixes 297 vulnerabilities

Oracle releases a collection of patches for multiple critical security vulnerabilities. The update contains 297 new security fixes ...
Read More
Latest Posts

Bug exploits a security vulnerability in almost all PCs and Macs

bugA study published by F-Secure has revealed a new bug that makes most of the devices, including those equipped with disk encryption, vulnerable to an attack that could steal personal data within minutes.

As he says ZDNet, F-Secure's findings state that modern security measures are enough to prevent theft caused by this new bug.

Attack is a variant of the old cold boot attack, which is a popular technique in the world of hacking. This type of attack resets a computer and then steals the data remaining in the memory RAM.

To steal the data through a cold boot attack, it would require physical access to the computer and specialized hardware. Regular computers are not considered to be the target of such an attack compared to computers that store valuable information such as those owned by government agencies and businesses.

One of the protection measures developed by hardware manufacturers is to replace the RAM content after a computer attack.

F-Secure researchers have found that they can stop the replacement process, making the computer vulnerable.

According to F-Secure's security director, Olle Segerdahl, who is engaged in research, "Although it's not that easy, it's not hard enough to find and exploit this defect, so there's a chance it already exists and some malicious users. "

The researchers said they have warned big companies such as Microsoft, Apple and Intel for their latest findings. Microsoft updated Bitlocker Guidance as an additional security measure while Apple said that all devices using the T2 chip are not vulnerable to these attacks.

Do you have an opinion? Leave your comment.

The author allows you to copy his / her text only if you report the source (, as an e-mail address (Live URL) of the article.
Updated on by

Reader Interactions

Leave a reply

Your email address is not published. Τα υποχρεωτικά πεδία σημειώνονται με *